{"id":432,"date":"2024-02-21T00:51:53","date_gmt":"2024-02-21T00:51:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/leeacheampong\/?page_id=432"},"modified":"2024-02-21T02:13:53","modified_gmt":"2024-02-21T02:13:53","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/leeacheampong\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>CYBERSECURITY TECHNIQUES AND OPERATIONS<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Diving into this course truly opened my eyes to the depth and breadth of securing and analyzing large computer networks and systems. It was a hands-on journey through the world of cybersecurity, where I learned to map networks with sophisticated software tools, delve into advanced packet analysis, and configure firewalls. Writing intrusion detection rules, conducting forensic investigations, and exploring penetration testing techniques were all part of this rigorous but rewarding experience. This course sharpened my skills and deepened my understanding, making it an invaluable part of my education in cybersecurity.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Traffic-Tracing-and-Sniffing-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Traffic-Tracing-and-Sniffing-1.\"><\/object><a id=\"wp-block-file--media-4df6f086-97c9-40e3-a62c-84012a5785ea\" href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Traffic-Tracing-and-Sniffing-1.pdf\">Traffic-Tracing-and-Sniffing-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Traffic-Tracing-and-Sniffing-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4df6f086-97c9-40e3-a62c-84012a5785ea\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Password-Cracking-3-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Password-Cracking-3-1.\"><\/object><a id=\"wp-block-file--media-ca90a2d4-36df-4c0e-b49a-b1c419a2e31b\" href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Password-Cracking-3-1.pdf\">Password-Cracking-3-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Password-Cracking-3-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ca90a2d4-36df-4c0e-b49a-b1c419a2e31b\"><\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Ethical-Hacking-3-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Ethical-Hacking-3-1.\"><\/object><a id=\"wp-block-file--media-6e0bc51e-7493-45a1-a539-8bc1cd8522ff\" href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Ethical-Hacking-3-1.pdf\">Ethical-Hacking-3-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-content\/uploads\/sites\/28388\/2024\/02\/Ethical-Hacking-3-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6e0bc51e-7493-45a1-a539-8bc1cd8522ff\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CYBERSECURITY TECHNIQUES AND OPERATIONS Diving into this course truly opened my eyes to the depth and breadth of securing and analyzing large computer networks and systems. It was a hands-on journey through the world of cybersecurity, where I learned to map networks with sophisticated software tools, delve into advanced packet analysis, and configure firewalls. Writing &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/leeacheampong\/cyse-301\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 301<\/span><\/a><\/p>\n","protected":false},"author":23368,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/pages\/432"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/users\/23368"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/pages\/432\/revisions"}],"predecessor-version":[{"id":479,"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/pages\/432\/revisions\/479"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/leeacheampong\/wp-json\/wp\/v2\/media?parent=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}